Features
Catching Counterfeiters With Page Vault
As the CEO and founder of IPCybercrime, my team and I have developed a systematic approach to investigating the online sale of fake branded goods. We work with law firms and corporate counsel to build cases against the counterfeiters. In the last decade, we've assisted in shutting down hundreds of thousands of websites offering counterfeit goods for sale. In many cases, $100s of millions were at stake.
Features
Preparing for a Data Breach with Cyber Insurance
Data breaches continue to escalate and garner national attention. The most recent news-making incident was the hack of electronic toy maker, VTech.
Features
111010001: An Article of Commerce?
In <i>ClearCorrect Operating, LLC v. ITC,</i> the Federal Circuit limited the ITC's jurisdiction over digital commerce. In a 2-1 decision, the panel held that the ITC lacks authority to regulate digital imports.
Features
Update on NY AG's Suits Against Daily Fantasy Sports Cos.
In mid-December, Manhattan Supreme Court Justice Manuel Mendez granted N.Y. Attorney General Eric Schneiderman's motion to halt daily fantasy sports (DFS) sites DraftKings and FanDuel from doing business in the state.
Features
<b><i>Online Extra:</b></i> Florida: Uber Drivers Are Contractors, Not Employees
Uber drivers in Florida will be considered independent contractors rather than employees, the Florida Department of Economic Opportunity determined on Dec. 3 in a victory for the app-based ridesharing company.
Features
<b><i>Online Extra:</b></i> Florida: Uber Drivers Are Contractors, Not Employees
Uber drivers in Florida will be considered independent contractors rather than employees, the Florida Department of Economic Opportunity determined on Dec. 3 in a victory for the app-based ridesharing company.
Features
Controversy from Talent Lawyer's Article on JAMS
Arbitration provider JAMS is staying neutral, sort of, on an entertainment litigator's claim that it favors big studios in arbitrations and mediations. The claim, made by Bird Marella partner Ronald Nessim in a law review this summer, is essentially that JAMS has a lock on studio business, with the overwhelming majority of studio contracts reviewed by Nessim naming JAMS as the dispute resolution provider.
Features
Prioritizing e-Mail Security in the Legal Sector
Data breaches and cyberattacks aren't new occurrences, but it can sometimes feel like they are. It's only in the last few years that we've seen these attacks make headlines more and more, increasing in both quantity and impact.
Features
Mental Health Issues In the Workplace
The challenges inherent in managing employee mental illness were vividly illustrated for the world in March of this year with the intentional crash of a Germanwings aircraft by an apparently mentally ill pilot. Although the repercussions of such tragic events can be more significant in safety-sensitive industries like transportation, these kinds of tragic events can happen in any workplace.
Features
CISA Passes: What It Means for Organizations and Their Data
The Cybersecurity Information Sharing Act (CISA) was passed by the Senate on Oct. 27, and while it still has a few hoops to jump through before it is enacted into law, the hotly debated proposed rules may considerably impact both those organizations holding sensitive data and the users to which that data belongs.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Meet the Lawyer Working on Inclusion Rider LanguageAt the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers & Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›